Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 13:03
Static task
static1
Behavioral task
behavioral1
Sample
5570ebcc17de3729abe1f4348bab64b0595cd1ea7ab1b4f0325a812fa94cd287.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5570ebcc17de3729abe1f4348bab64b0595cd1ea7ab1b4f0325a812fa94cd287.exe
Resource
win10v2004-20220812-en
General
-
Target
5570ebcc17de3729abe1f4348bab64b0595cd1ea7ab1b4f0325a812fa94cd287.exe
-
Size
1.5MB
-
MD5
332b607b6f9cd97c82af10f2724faec1
-
SHA1
a20a76b94bfb07b158a77ade52562a91d30a1a84
-
SHA256
5570ebcc17de3729abe1f4348bab64b0595cd1ea7ab1b4f0325a812fa94cd287
-
SHA512
0d5db1f0151731309ab056832dafe829ff3016e7a2b8246e841f8253674607452c5d26a7b3b6d2679a59ee1f2a9f413a5fe46d592093585ca0883ca3e7e48003
-
SSDEEP
24576:lzD5urNhRWx2Mk4JJQByw7Imlq3g495S0PwbphrpgXXOZuv/rTWeR5j4UwJZQUYh:/6/ye0PIphrp9Zuvjqa0UidK
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
5570ebcc17de3729abe1f4348bab64b0595cd1ea7ab1b4f0325a812fa94cd287.exedescription pid process target process PID 3780 set thread context of 5096 3780 5570ebcc17de3729abe1f4348bab64b0595cd1ea7ab1b4f0325a812fa94cd287.exe 5570ebcc17de3729abe1f4348bab64b0595cd1ea7ab1b4f0325a812fa94cd287.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
5570ebcc17de3729abe1f4348bab64b0595cd1ea7ab1b4f0325a812fa94cd287.exepid process 5096 5570ebcc17de3729abe1f4348bab64b0595cd1ea7ab1b4f0325a812fa94cd287.exe 5096 5570ebcc17de3729abe1f4348bab64b0595cd1ea7ab1b4f0325a812fa94cd287.exe 5096 5570ebcc17de3729abe1f4348bab64b0595cd1ea7ab1b4f0325a812fa94cd287.exe 5096 5570ebcc17de3729abe1f4348bab64b0595cd1ea7ab1b4f0325a812fa94cd287.exe 5096 5570ebcc17de3729abe1f4348bab64b0595cd1ea7ab1b4f0325a812fa94cd287.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
5570ebcc17de3729abe1f4348bab64b0595cd1ea7ab1b4f0325a812fa94cd287.exedescription pid process target process PID 3780 wrote to memory of 5096 3780 5570ebcc17de3729abe1f4348bab64b0595cd1ea7ab1b4f0325a812fa94cd287.exe 5570ebcc17de3729abe1f4348bab64b0595cd1ea7ab1b4f0325a812fa94cd287.exe PID 3780 wrote to memory of 5096 3780 5570ebcc17de3729abe1f4348bab64b0595cd1ea7ab1b4f0325a812fa94cd287.exe 5570ebcc17de3729abe1f4348bab64b0595cd1ea7ab1b4f0325a812fa94cd287.exe PID 3780 wrote to memory of 5096 3780 5570ebcc17de3729abe1f4348bab64b0595cd1ea7ab1b4f0325a812fa94cd287.exe 5570ebcc17de3729abe1f4348bab64b0595cd1ea7ab1b4f0325a812fa94cd287.exe PID 3780 wrote to memory of 5096 3780 5570ebcc17de3729abe1f4348bab64b0595cd1ea7ab1b4f0325a812fa94cd287.exe 5570ebcc17de3729abe1f4348bab64b0595cd1ea7ab1b4f0325a812fa94cd287.exe PID 3780 wrote to memory of 5096 3780 5570ebcc17de3729abe1f4348bab64b0595cd1ea7ab1b4f0325a812fa94cd287.exe 5570ebcc17de3729abe1f4348bab64b0595cd1ea7ab1b4f0325a812fa94cd287.exe PID 3780 wrote to memory of 5096 3780 5570ebcc17de3729abe1f4348bab64b0595cd1ea7ab1b4f0325a812fa94cd287.exe 5570ebcc17de3729abe1f4348bab64b0595cd1ea7ab1b4f0325a812fa94cd287.exe PID 3780 wrote to memory of 5096 3780 5570ebcc17de3729abe1f4348bab64b0595cd1ea7ab1b4f0325a812fa94cd287.exe 5570ebcc17de3729abe1f4348bab64b0595cd1ea7ab1b4f0325a812fa94cd287.exe PID 3780 wrote to memory of 5096 3780 5570ebcc17de3729abe1f4348bab64b0595cd1ea7ab1b4f0325a812fa94cd287.exe 5570ebcc17de3729abe1f4348bab64b0595cd1ea7ab1b4f0325a812fa94cd287.exe PID 3780 wrote to memory of 5096 3780 5570ebcc17de3729abe1f4348bab64b0595cd1ea7ab1b4f0325a812fa94cd287.exe 5570ebcc17de3729abe1f4348bab64b0595cd1ea7ab1b4f0325a812fa94cd287.exe PID 3780 wrote to memory of 5096 3780 5570ebcc17de3729abe1f4348bab64b0595cd1ea7ab1b4f0325a812fa94cd287.exe 5570ebcc17de3729abe1f4348bab64b0595cd1ea7ab1b4f0325a812fa94cd287.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5570ebcc17de3729abe1f4348bab64b0595cd1ea7ab1b4f0325a812fa94cd287.exe"C:\Users\Admin\AppData\Local\Temp\5570ebcc17de3729abe1f4348bab64b0595cd1ea7ab1b4f0325a812fa94cd287.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\5570ebcc17de3729abe1f4348bab64b0595cd1ea7ab1b4f0325a812fa94cd287.exe"C:\Users\Admin\AppData\Local\Temp\5570ebcc17de3729abe1f4348bab64b0595cd1ea7ab1b4f0325a812fa94cd287.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:5096